Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       10.0.0.0 - 10.255.255.255
CIDR:           10.0.0.0/8
NetName:        PRIVATE-ADDRESS-ABLK-RFC1918-IANA-RESERVED
NetHandle:      NET-10-0-0-0-1
Parent:          ()
NetType:        IANA Special Use
OriginAS:       
Organization:   Internet Assigned Numbers Authority (IANA)
RegDate:        
Updated:        2024-05-24
Comment:        These addresses are in use by many millions of independently operated networks, which might be as small as a single computer connected to a home gateway, and are automatically configured in hundreds of millions of devices.  They are only intended for use within a private context  and traffic that needs to cross the Internet will need to use a different, unique address.
Comment:        
Comment:        These addresses can be used by anyone without any need to coordinate with IANA or an Internet registry.  The traffic from these addresses does not come from ICANN or IANA.  We are not the source of activity you may see on logs or in e-mail records.  Please refer to http://www.iana.org/abuse/answers
Comment:        
Comment:        These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Best Current Practice document, RFC 1918 which can be found at:
Comment:        http://datatracker.ietf.org/doc/rfc1918
Ref:            https://rdap.arin.net/registry/ip/10.0.0.0



OrgName:        Internet Assigned Numbers Authority
OrgId:          IANA
Address:        12025 Waterfront Drive
Address:        Suite 300
City:           Los Angeles
StateProv:      CA
PostalCode:     90292
Country:        US
RegDate:        
Updated:        2024-05-24
Ref:            https://rdap.arin.net/registry/entity/IANA


OrgTechHandle: IANA-IP-ARIN
OrgTechName:   ICANN
OrgTechPhone:  +1-310-301-5820 
OrgTechEmail:  abuse@iana.org
OrgTechRef:    https://rdap.arin.net/registry/entity/IANA-IP-ARIN

OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName:   ICANN
OrgAbusePhone:  +1-310-301-5820 
OrgAbuseEmail:  abuse@iana.org
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IANA-IP-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 10.100.100.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26470
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;10.100.100.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030701 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 08 10:50:45 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 242.100.100.10.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.100.100.10.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
137.74.119.50 attackspam
'Fail2Ban'
2020-04-05 03:16:06
144.217.42.212 attack
Invalid user keitaro from 144.217.42.212 port 47097
2020-04-05 03:42:09
167.71.106.157 attack
DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
UA removed
2020-04-05 03:40:48
185.189.12.232 attackspam
(sshd) Failed SSH login from 185.189.12.232 (RU/Russia/seweeesdssss.example.com): 5 in the last 3600 secs
2020-04-05 03:44:31
92.118.160.21 attackbots
Unauthorized connection attempt detected from IP address 92.118.160.21 to port 8888
2020-04-05 03:49:40
24.6.59.51 attack
sshd jail - ssh hack attempt
2020-04-05 03:51:13
34.69.27.237 attackspambots
(sshd) Failed SSH login from 34.69.27.237 (US/United States/237.27.69.34.bc.googleusercontent.com): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  4 15:35:31 ubnt-55d23 sshd[25751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.69.27.237  user=root
Apr  4 15:35:33 ubnt-55d23 sshd[25751]: Failed password for root from 34.69.27.237 port 58426 ssh2
2020-04-05 03:48:16
119.82.224.75 attack
Microsoft SQL Server User Authentication Brute Force Attempt, PTR: ip-host.224.75.
2020-04-05 03:38:50
222.186.15.62 attackspam
Apr  4 15:44:20 plusreed sshd[7737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
Apr  4 15:44:21 plusreed sshd[7737]: Failed password for root from 222.186.15.62 port 12554 ssh2
...
2020-04-05 03:48:59
128.199.72.169 attack
WordPress XMLRPC scan :: 128.199.72.169 0.452 - [04/Apr/2020:17:47:13  0000] www.[censored_1] "POST //xmlrpc.php HTTP/1.1" 503 19373 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" "HTTP/1.1"
2020-04-05 03:18:51
194.6.254.96 attackspambots
SPAM
2020-04-05 03:41:42
45.95.168.245 attackbots
Invalid user admin from 45.95.168.245 port 55775
2020-04-05 03:15:21
51.38.189.209 attackspambots
k+ssh-bruteforce
2020-04-05 03:36:00
193.107.75.42 attackspambots
Apr  4 18:01:40 ms-srv sshd[6025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.107.75.42  user=root
Apr  4 18:01:41 ms-srv sshd[6025]: Failed password for invalid user root from 193.107.75.42 port 39044 ssh2
2020-04-05 03:13:56
103.130.213.191 attackspambots
Apr  3 14:44:46 cumulus sshd[22632]: Invalid user yy from 103.130.213.191 port 40750
Apr  3 14:44:46 cumulus sshd[22632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.130.213.191
Apr  3 14:44:49 cumulus sshd[22632]: Failed password for invalid user yy from 103.130.213.191 port 40750 ssh2
Apr  3 14:44:49 cumulus sshd[22632]: Received disconnect from 103.130.213.191 port 40750:11: Bye Bye [preauth]
Apr  3 14:44:49 cumulus sshd[22632]: Disconnected from 103.130.213.191 port 40750 [preauth]
Apr  3 14:51:55 cumulus sshd[23333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.130.213.191  user=r.r
Apr  3 14:51:56 cumulus sshd[23333]: Failed password for r.r from 103.130.213.191 port 52662 ssh2
Apr  3 14:51:57 cumulus sshd[23333]: Received disconnect from 103.130.213.191 port 52662:11: Bye Bye [preauth]
Apr  3 14:51:57 cumulus sshd[23333]: Disconnected from 103.130.213.191 port 52662 [pr........
-------------------------------
2020-04-05 03:38:07

Recently Reported IPs

185.247.137.109 143.198.154.196 2606:4700:10::ac43:2395 2606:4700:10::ac43:2748
2606:4700:10::6816:3649 2606:4700:10::6816:3971 2606:4700:10::6816:3304 2606:4700:10::ac43:827
2606:4700:10::6816:2111 2606:4700:10::6816:1042 2606:4700:10::6814:6295 110.78.154.211
2606:4700:10::6816:3502 20.234.20.103 183.191.125.135 124.117.193.134
121.29.149.152 116.167.203.103 36.155.184.139 112.109.233.21